{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T16:08:04Z","timestamp":1777392484630,"version":"3.51.4"},"publisher-location":"Cham","reference-count":61,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031626449","type":"print"},{"value":"9783031626456","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-62645-6_4","type":"book-chapter","created":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T05:01:51Z","timestamp":1718168511000},"page":"60-81","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["JustAct: Actions Universally Justified by\u00a0Partial Dynamic Policies"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9124-9092","authenticated-orcid":false,"given":"Christopher A.","family":"Esterhuyse","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9759-5973","authenticated-orcid":false,"given":"Tim","family":"M\u00fcller","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8113-2221","authenticated-orcid":false,"given":"L. Thomas","family":"van Binsbergen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,13]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","unstructured":"Akaichi, I., Kirrane, S.: Usage control specification, enforcement, and robustness: a survey. CoRR abs\/2203.04800 (2022). https:\/\/doi.org\/10.48550\/arXiv.2203.04800","DOI":"10.48550\/arXiv.2203.04800"},{"key":"4_CR2","unstructured":"Anderson, A., et\u00a0al.: extensible access control markup language (xacml) version 1.0. Oasis (2003)"},{"key":"4_CR3","unstructured":"Andrighetto, G., Governatori, G., Noriega, P., van\u00a0der Torre, L.W.N. (eds.): Normative Multi-Agent Systems, Dagstuhl Follow-Ups, vol.\u00a04. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2013)"},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Oliveira, R., Felber, P., Hu, Y.C. (eds.) Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto, Portugal, 23\u201326 April 2018, pp. 30:1\u201330:15. ACM (2018). https:\/\/doi.org\/10.1145\/3190508.3190538","DOI":"10.1145\/3190508.3190538"},{"issue":"3","key":"4_CR5","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1481506.1481513","volume":"36","author":"R Bakhshi","year":"2008","unstructured":"Bakhshi, R., Cloth, L., Fokkink, W.J., Haverkort, B.R.: Meanfield analysis for the evaluation of gossip protocols. SIGMETRICS Perform. Evaluation Rev. 36(3), 31\u201339 (2008). https:\/\/doi.org\/10.1145\/1481506.1481513","journal-title":"SIGMETRICS Perform. Evaluation Rev."},{"key":"4_CR6","doi-asserted-by":"publisher","unstructured":"van Binsbergen, L.T., Kebede, M.G., Baugh, J., van Engers, T.M., van Vuurden, D.G.: Dynamic generation of access control policies from social policies. In: Varandas, N., Yasar, A., Malik, H., Galland, S. (eds.) The 12th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2021) \/ The 11th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2021), Leuven, Belgium, 1-4 November 2021. Procedia Computer Science, vol.\u00a0198, pp. 140\u2013147. Elsevier (2021). https:\/\/doi.org\/10.1016\/j.procs.2021.12.221","DOI":"10.1016\/j.procs.2021.12.221"},{"key":"4_CR7","doi-asserted-by":"publisher","unstructured":"van Binsbergen, L.T., Liu, L., van Doesburg, R., van Engers, T.M.: eflint: a domain-specific language for executable norm specifications. In: Erwig, M., Gray, J. (eds.) GPCE \u201920: Proceedings of the 19th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, Virtual Event, USA, November 16-17, 2020. pp. 124\u2013136. ACM (2020). https:\/\/doi.org\/10.1145\/3425898.3426958","DOI":"10.1145\/3425898.3426958"},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Bistarelli, S., Martinelli, F., Santini, F.: Weighted datalog and levels of trust. In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, 4-7 March 2008, Technical University of Catalonia, Barcelona, Spain, pp. 1128\u20131134. IEEE Computer Society (2008). https:\/\/doi.org\/10.1109\/ARES.2008.197","DOI":"10.1109\/ARES.2008.197"},{"key":"4_CR9","doi-asserted-by":"publisher","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: 1996 IEEE Symposium on Security and Privacy, 6\u20138 May 1996, Oakland, CA, USA, pp. 164\u2013173. IEEE Computer Society (1996). https:\/\/doi.org\/10.1109\/SECPRI.1996.502679","DOI":"10.1109\/SECPRI.1996.502679"},{"issue":"2","key":"4_CR10","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jal.2007.06.006","volume":"6","author":"G Boella","year":"2008","unstructured":"Boella, G., van der Torre, L.W.N.: Substantive and procedural norms in normative multiagent systems. J. Appl. Log. 6(2), 152\u2013171 (2008). https:\/\/doi.org\/10.1016\/j.jal.2007.06.006","journal-title":"J. Appl. Log."},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Celik, Z.B., Acar, A., Aksu, H., Sheatsley, R., McDaniel, P.D., Uluagac, A.S.: Curie: Policy-based secure data exchange. In: Ahn, G., Thuraisingham, B., Kantarcioglu, M., Krishnan, R. (eds.) Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, CODASPY 2019, Richardson, TX, USA, 25\u201327 March 2019, pp. 121\u2013132. ACM (2019). https:\/\/doi.org\/10.1145\/3292006.3300042","DOI":"10.1145\/3292006.3300042"},{"issue":"1","key":"4_CR12","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/69.43410","volume":"1","author":"S Ceri","year":"1989","unstructured":"Ceri, S., Gottlob, G., Tanca, L.: What you always wanted to know about datalog (and never dared to ask). IEEE Trans. Knowl. Data Eng. 1(1), 146\u2013166 (1989). https:\/\/doi.org\/10.1109\/69.43410","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"4_CR13","doi-asserted-by":"publisher","unstructured":"Clavel, M., Dur\u00e1n, F., Eker, S., Lincoln, P., Mart\u00ed-Oliet, N., Meseguer, J., Talcott, C.L.: The maude 2.0 system. In: Nieuwenhuis, R. (ed.) Rewriting Techniques and Applications, 14th International Conference, RTA 2003, Valencia, Spain, June 9-11, 2003, Proceedings. Lecture Notes in Computer Science, vol.\u00a02706, pp. 76\u201387. Springer (2003). https:\/\/doi.org\/10.1007\/3-540-44881-0_7","DOI":"10.1007\/3-540-44881-0_7"},{"key":"4_CR14","doi-asserted-by":"publisher","unstructured":"Curry, E., Tuikka, T.: An organizational maturity model fordata spaces: a data sharing wheel approach. In: Curry, E., Scerri, S., Tuikka, T. (eds.) Data Spaces - Design, Deployment and Future Directions, pp. 21\u201342. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-030-98636-0_2","DOI":"10.1007\/978-3-030-98636-0_2"},{"key":"4_CR15","unstructured":"Digital Asset: canton network: a network of networks for smart contract applications. https:\/\/www.digitalasset.com\/hubfs\/Canton\/Canton%20Network%20-%20White%20Paper.pdf. Accessed 23 Feb 2024. (Whitepaper)"},{"issue":"13","key":"4_CR16","doi-asserted-by":"publisher","first-page":"15098","DOI":"10.1007\/S11227-023-05233-Z","volume":"79","author":"TVT Doan","year":"2023","unstructured":"Doan, T.V.T., Messai, M., Gavin, G., Darmont, J.: A survey on implementations of homomorphic encryption schemes. J. Supercomput. 79(13), 15098\u201315139 (2023). https:\/\/doi.org\/10.1007\/S11227-023-05233-Z","journal-title":"J. Supercomput."},{"key":"4_CR17","doi-asserted-by":"publisher","unstructured":"Esterhuyse, C.A., M\u00fcller, T., van Binsbergen, L.T., Belloum, A.S.Z.: Exploring the enforcement of private, dynamic policies on medical workflow execution. In: 18th IEEE International Conference on e-Science, e-Science 2022, Salt Lake City, UT, USA, 11\u201314 October 2022, pp. 481\u2013486. IEEE (2022). https:\/\/doi.org\/10.1109\/ESCIENCE55777.2022.00086","DOI":"10.1109\/ESCIENCE55777.2022.00086"},{"key":"4_CR18","unstructured":"European Commission: Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text with EEA relevance) (2016). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"4_CR19","doi-asserted-by":"publisher","unstructured":"Fernandez, R.C.: Data-sharing markets: model, protocol, and algorithms to incentivize the formation of data-sharing consortia. Proc. ACM Manag. Data 1(2), 172:1\u2013172:25 (2023). https:\/\/doi.org\/10.1145\/3589317","DOI":"10.1145\/3589317"},{"issue":"4","key":"4_CR20","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1109\/THMS.2022.3163185","volume":"52","author":"G Fragkos","year":"2022","unstructured":"Fragkos, G., Johnson, J., Tsiropoulou, E.: Dynamic role-based access control policy for smart grid applications: an offline deep reinforcement learning approach. IEEE Trans. Hum. Mach. Syst. 52(4), 761\u2013773 (2022). https:\/\/doi.org\/10.1109\/THMS.2022.3163185","journal-title":"IEEE Trans. Hum. Mach. Syst."},{"issue":"2","key":"4_CR21","doi-asserted-by":"publisher","first-page":"107","DOI":"10.3233\/AIC-2011-0491","volume":"24","author":"M Gebser","year":"2011","unstructured":"Gebser, M., Kaufmann, B., Kaminski, R., Ostrowski, M., Schaub, T., Schneider, M.: Potassco: the potsdam answer set solving collection. AI Commun. 24(2), 107\u2013124 (2011). https:\/\/doi.org\/10.3233\/AIC-2011-0491","journal-title":"AI Commun."},{"key":"4_CR22","unstructured":"Gelfond, M., Lifschitz, V.: The stable model semantics for logic programming. In: Kowalski, R.A., Bowen, K.A. (eds.) Logic Programming, Proceedings of the Fifth International Conference and Symposium, Seattle, Washington, USA, 15\u201319 August 1988 (2 Volumes), pp. 1070\u20131080. MIT Press (1988)"},{"issue":"4","key":"4_CR23","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/s10506-018-9223-3","volume":"26","author":"G Governatori","year":"2018","unstructured":"Governatori, G., Idelberger, F., Milosevic, Z., Riveret, R., Sartor, G., Xu, X.: On legal contracts, imperative and declarative smart contracts, and blockchain systems. Artif. Intell. Law 26(4), 377\u2013409 (2018). https:\/\/doi.org\/10.1007\/s10506-018-9223-3","journal-title":"Artif. Intell. Law"},{"key":"4_CR24","unstructured":"Ianella, R.: Open digital rights language (ODRL). Cultivating the Creative Commons, Open Content Licensing (2007)"},{"key":"4_CR25","doi-asserted-by":"publisher","unstructured":"Jung, C., D\u00f6rr, J.: Data usage control. In: Otto, B., ten Hompel, M., Wrobel, S. (eds.) Designing Data Spaces: The Ecosystem Approach to Competitive Advantage, pp. 129\u2013146. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-93975-5_8","DOI":"10.1007\/978-3-030-93975-5_8"},{"key":"4_CR26","doi-asserted-by":"publisher","unstructured":"Kassem, J.A., de\u00a0Laat, C., Taal, A., Grosso, P.: The EPI framework: a dynamic data sharing framework for healthcare use cases. IEEE Access 8, 179909\u2013179920 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3028051","DOI":"10.1109\/ACCESS.2020.3028051"},{"key":"4_CR27","doi-asserted-by":"publisher","unstructured":"Kassem, J.A., Valkering, O., Belloum, A., Grosso, P.: EPI framework: approach for traffic redirection through containerised network functions. In: 17th IEEE International Conference on eScience, eScience 2021, Innsbruck, Austria, 20\u201323 September 2021, pp. 80\u201389. IEEE (2021). https:\/\/doi.org\/10.1109\/eScience51609.2021.00018","DOI":"10.1109\/eScience51609.2021.00018"},{"key":"4_CR28","doi-asserted-by":"publisher","unstructured":"Ketsman, B., Koch, C.: Datalog with negation and monotonicity. In: Lutz, C., Jung, J.C. (eds.) 23rd International Conference on Database Theory, ICDT 2020, March 30-April 2, 2020, Copenhagen, Denmark. LIPIcs, vol.\u00a0155, pp. 19:1\u201319:18. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2020). https:\/\/doi.org\/10.4230\/LIPIcs.ICDT.2020.19","DOI":"10.4230\/LIPIcs.ICDT.2020.19"},{"issue":"21","key":"4_CR29","doi-asserted-by":"publisher","first-page":"8188","DOI":"10.3390\/S22218188","volume":"22","author":"M Khan","year":"2022","unstructured":"Khan, M., den Hartog, F.T.H., Hu, J.: A survey and ontology of blockchain consensus algorithms for resource-constrained IoT systems. Sensors 22(21), 8188 (2022). https:\/\/doi.org\/10.3390\/S22218188","journal-title":"Sensors"},{"key":"4_CR30","doi-asserted-by":"publisher","unstructured":"Khobragade, P., Turuk, A.K.: Blockchain consensus algorithms: A survey. In: Prieto, J., Mart\u00ednez, F.L.B., Ferretti, S., Guarde\u00f1o, D.A., Nevado-Batalla, P.T. (eds.) Blockchain and Applications, 4th International Congress, BLOCKCHAIN 2022, L\u2019Aquila, Italy, 13\u201315 July 2022, LNNS, vol.\u00a0595, pp. 198\u2013210. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-21229-1_19","DOI":"10.1007\/978-3-031-21229-1_19"},{"key":"4_CR31","doi-asserted-by":"publisher","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part I, LNCS, vol. 10401, pp. 357\u2013388. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_12","DOI":"10.1007\/978-3-319-63688-7_12"},{"issue":"1","key":"4_CR32","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/605434.605438","volume":"6","author":"N Li","year":"2003","unstructured":"Li, N., Grosof, B.N., Feigenbaum, J.: Delegation logic: a logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur. 6(1), 128\u2013171 (2003). https:\/\/doi.org\/10.1145\/605434.605438","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"4_CR33","doi-asserted-by":"publisher","unstructured":"Li, N., Mitchell, J.C.: DATALOG with constraints: a foundation for trust management languages. In: Dahl, V., Wadler, P. (eds.) Practical Aspects of Declarative Languages, 5th International Symposium, PADL 2003, New Orleans, LA, USA, 13\u201314 January 2003, Proceedings, LNCS, vol.\u00a02562, pp. 58\u201373. Springer, Cham (2003). https:\/\/doi.org\/10.1007\/3-540-36388-2_6","DOI":"10.1007\/3-540-36388-2_6"},{"issue":"2","key":"4_CR34","doi-asserted-by":"publisher","first-page":"143","DOI":"10.3233\/WEB-170357","volume":"15","author":"X Mao","year":"2017","unstructured":"Mao, X., Wang, Q., Yang, S.: A survey of agent-oriented programming from software engineering perspective. Web Intell. 15(2), 143\u2013163 (2017). https:\/\/doi.org\/10.3233\/WEB-170357","journal-title":"Web Intell."},{"key":"4_CR35","doi-asserted-by":"publisher","unstructured":"Mohassel, P., Zhang, Y.: Secureml: a system for scalable privacy-preserving machine learning. In: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, 22\u201326 May 2017, pp. 19\u201338. IEEE Computer Society (2017). https:\/\/doi.org\/10.1109\/SP.2017.12","DOI":"10.1109\/SP.2017.12"},{"key":"4_CR36","doi-asserted-by":"publisher","unstructured":"Munoz-Arcentales, A., L\u00f3pez-Pernas, S., Pozo, A., Alonso, \u00c1., Salvach\u00faa, J., Huecas, G.: An architecture for providing data usage and access control in data sharing ecosystems. In: Shakshuki, E.M., Yasar, A., Malik, H. (eds.) The 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) \/ The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) \/ Affiliated Workshops, Coimbra, Portugal, 4\u20137 November 2019, Procedia Computer Science, vol.\u00a0160, pp. 590\u2013597. Elsevier (2019). https:\/\/doi.org\/10.1016\/J.PROCS.2019.11.042","DOI":"10.1016\/J.PROCS.2019.11.042"},{"key":"4_CR37","doi-asserted-by":"publisher","first-page":"117836","DOI":"10.1109\/ACCESS.2022.3217201","volume":"10","author":"MT de Oliveira","year":"2022","unstructured":"de Oliveira, M.T., Reis, L.H.A., Verginadis, Y., Mattos, D.M.F., Olabarriaga, S.D.: Smartaccess: attribute-based access control system for medical records based on smart contracts. IEEE Access 10, 117836\u2013117854 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3217201","journal-title":"IEEE Access"},{"key":"4_CR38","doi-asserted-by":"publisher","unstructured":"Parvizimosaed, A., Roveri, M., Rasti, A., Amyot, D., Logrippo, L., Mylopoulos, J.: Model-checking legal contracts with symboleopc. In: Syriani, E., Sahraoui, H.A., Bencomo, N., Wimmer, M. (eds.) Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems, MODELS 2022, Montreal, Quebec, Canada, 23\u201328 October 2022, pp. 278\u2013288. ACM (2022). https:\/\/doi.org\/10.1145\/3550355.3552449","DOI":"10.1145\/3550355.3552449"},{"issue":"4","key":"4_CR39","doi-asserted-by":"publisher","first-page":"445","DOI":"10.3233\/FI-1990-13404","volume":"13","author":"TC Przymusinski","year":"1990","unstructured":"Przymusinski, T.C.: The well-founded semantics coincides with the three-valued stable semantics. Fundam. Inform. 13(4), 445\u2013463 (1990)","journal-title":"Fundam. Inform."},{"issue":"6","key":"4_CR40","doi-asserted-by":"publisher","first-page":"4682","DOI":"10.1109\/JIOT.2020.2969326","volume":"7","author":"J Qiu","year":"2020","unstructured":"Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S., Fang, B.: A survey on access control in the age of internet of things. IEEE Internet Things J. 7(6), 4682\u20134696 (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.2969326","journal-title":"IEEE Internet Things J."},{"key":"4_CR41","doi-asserted-by":"publisher","unstructured":"Ren, W., Beard, R.W., Atkins, E.M.: A survey of consensus problems in multi-agent coordination. In: American Control Conference, ACC 2005, Portland, OR, USA, 8-10 June 2005, pp. 1859\u20131864. IEEE (2005). https:\/\/doi.org\/10.1109\/ACC.2005.1470239","DOI":"10.1109\/ACC.2005.1470239"},{"key":"4_CR42","doi-asserted-by":"publisher","unstructured":"Ross, K.A.: Modular stratification and magic sets for DATALOG programs with negation. In: Rosenkrantz, D.J., Sagiv, Y. (eds.) Proceedings of the Ninth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2\u20134 April 1990, Nashville, Tennessee, USA, pp. 161\u2013171. ACM Press (1990). https:\/\/doi.org\/10.1145\/298514.298558","DOI":"10.1145\/298514.298558"},{"key":"4_CR43","doi-asserted-by":"publisher","unstructured":"Sacha, K.: Trust management languages and complexity. In: Meersman, R., et al. (eds.) On the Move to Meaningful Internet Systems: OTM 2011 - Confederated International Conferences: CoopIS, DOA-SVI, and ODBASE 2011, Hersonissos, Crete, Greece, 17\u201321 October 2011, Proceedings, Part II, LNCS, vol.\u00a07045, pp. 588\u2013604. Springer, Cham (2011). https:\/\/doi.org\/10.1007\/978-3-642-25106-1_12","DOI":"10.1007\/978-3-642-25106-1_12"},{"key":"4_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-45608-2_3","volume-title":"Foundations of Security Analysis and Design","author":"P Samarati","year":"2001","unstructured":"Samarati, P., de Vimercati, S.C.: Access control: policies, models, and mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 137\u2013196. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45608-2_3"},{"key":"4_CR45","doi-asserted-by":"publisher","unstructured":"Sandhu, R.S.: Role-based access control. Adv. Comput. 46, 237\u2013286 (1998). https:\/\/doi.org\/10.1016\/S0065-2458(08)60206-5","DOI":"10.1016\/S0065-2458(08)60206-5"},{"issue":"2","key":"4_CR46","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MC.2006.58","volume":"39","author":"DC Schmidt","year":"2006","unstructured":"Schmidt, D.C., et al.: Model-driven engineering. Computer-IEEE Comput. Soc. 39(2), 25 (2006)","journal-title":"Computer-IEEE Comput. Soc."},{"key":"4_CR47","doi-asserted-by":"publisher","unstructured":"Servos, D., Osborn, S.L.: Current research and open problems in attribute-based access control. ACM Comput. Surv. 49(4), 65:1\u201365:45 (2017). https:\/\/doi.org\/10.1145\/3007204","DOI":"10.1145\/3007204"},{"key":"4_CR48","doi-asserted-by":"publisher","unstructured":"Shakeri, S., et al.: Modeling and matching digital data marketplace policies. In: 15th International Conference on eScience, eScience 2019, San Diego, CA, USA, 24\u201327 September 2019, pp. 570\u2013577. IEEE (2019). https:\/\/doi.org\/10.1109\/ESCIENCE.2019.00078","DOI":"10.1109\/ESCIENCE.2019.00078"},{"key":"4_CR49","doi-asserted-by":"publisher","unstructured":"Sharifi, S., Parvizimosaed, A., Amyot, D., Logrippo, L., Mylopoulos, J.: Symboleo: towards a specification language for legal contracts. In: Breaux, T.D., Zisman, A., Fricker, S., Glinz, M. (eds.) 28th IEEE International Requirements Engineering Conference, RE 2020, Zurich, Switzerland, August 31 - September 4, 2020, pp. 364\u2013369. IEEE (2020). https:\/\/doi.org\/10.1109\/RE48521.2020.00049","DOI":"10.1109\/RE48521.2020.00049"},{"issue":"3","key":"4_CR50","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BF02939504","volume":"9","author":"B Shi","year":"1994","unstructured":"Shi, B., Zhou, A.: Bottom-up evaluation of datalog with negation. J. Comput. Sci. Technol. 9(3), 229\u2013244 (1994). https:\/\/doi.org\/10.1007\/BF02939504","journal-title":"J. Comput. Sci. Technol."},{"issue":"1","key":"4_CR51","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/0004-3702(93)90034-9","volume":"60","author":"Y Shoham","year":"1993","unstructured":"Shoham, Y.: Agent-oriented programming. Artif. Intell. 60(1), 51\u201392 (1993). https:\/\/doi.org\/10.1016\/0004-3702(93)90034-9","journal-title":"Artif. Intell."},{"key":"4_CR52","unstructured":"Strasser, C., Antonelli, G.A.: Non-monotonic Logic. In: Zalta, E.N. (ed.) The Stanford Encyclopedia of Philosophy. Metaphysics Research Lab, Stanford University, Summer 2019 edn. (2019)"},{"key":"4_CR53","doi-asserted-by":"publisher","unstructured":"Torre-Bastida, A.I., Gil, G., Mi\u00f1\u00f3n, R., D\u00edaz-de-Arcaya, J.: Technological perspective of data governance in data space ecosystems. In: Curry, E., Scerri, S., Tuikka, T. (eds.) Data Spaces - Design, Deployment and Future Directions, pp. 65\u201387. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-98636-0_4","DOI":"10.1007\/978-3-030-98636-0_4"},{"key":"4_CR54","doi-asserted-by":"publisher","unstructured":"Um-e-Ghazia, Masood, R., Shibli, M.A., Bilal, M.: Usage control model specification in XACML policy language - XACML policy engine of UCON. In: Cortesi, A., Chaki, N., Saeed, K., Wierzchon, S.T. (eds.) Computer Information Systems and Industrial Management - 11th IFIP TC 8 International Conference, CISIM 2012, Venice, Italy, 26\u201328 September 2012. Proceedings. LNCS, vol.\u00a07564, pp. 68\u201379. Springer, Cham (2012). https:\/\/doi.org\/10.1007\/978-3-642-33260-9_5","DOI":"10.1007\/978-3-642-33260-9_5"},{"key":"4_CR55","doi-asserted-by":"publisher","unstructured":"Valkering, O., Cushing, R., Belloum, A.: Brane: a framework for programmable orchestration of multi-site applications. In: 17th IEEE International Conference on eScience, eScience 2021, Innsbruck, Austria, 20\u201323 September 2021, pp. 277\u2013282. IEEE (2021). https:\/\/doi.org\/10.1109\/ESCIENCE51609.2021.00056","DOI":"10.1109\/ESCIENCE51609.2021.00056"},{"issue":"3","key":"4_CR56","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1145\/116825.116838","volume":"38","author":"A Van Gelder","year":"1991","unstructured":"Van Gelder, A., Ross, K.A., Schlipf, J.S.: The well-founded semantics for general logic programs. J. ACM 38(3), 619\u2013649 (1991). https:\/\/doi.org\/10.1145\/116825.116838","journal-title":"J. ACM"},{"key":"4_CR57","doi-asserted-by":"publisher","unstructured":"Vigan\u00f2, F., Colombetti, M.: Symbolic model checking of institutions. In: Gini, M.L., Kauffman, R.J., Sarppo, D., Dellarocas, C., Dignum, F. (eds.) Proceedings of the 9th International Conference on Electronic Commerce: The Wireless World of Electronic Commerce, 2007, University of Minnesota, Minneapolis, MN, USA, 19\u201322 August 2007. ACM International Conference Proceeding Series, vol.\u00a0258, pp. 35\u201344. ACM (2007). https:\/\/doi.org\/10.1145\/1282100.1282109","DOI":"10.1145\/1282100.1282109"},{"issue":"1","key":"4_CR58","doi-asserted-by":"publisher","first-page":"16","DOI":"10.2307\/785533","volume":"23","author":"NH Wesley","year":"1913","unstructured":"Wesley, N.H.: Some fundamental legal conceptions as applied in judicial reasoning. Yale Law J. 23(1), 16 (1913)","journal-title":"Yale Law J."},{"issue":"4","key":"4_CR59","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/1108906.1108908","volume":"8","author":"X Zhang","year":"2005","unstructured":"Zhang, X., Parisi-Presicce, F., Sandhu, R.S., Park, J.: Formal model and policy specification of usage control. ACM Trans. Inf. Syst. Secur. 8(4), 351\u2013387 (2005). https:\/\/doi.org\/10.1145\/1108906.1108908","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"4_CR60","doi-asserted-by":"publisher","unstructured":"Zhao, G., Chadwick, D.W.: On the modeling of bell-lapadula security policies using RBAC. In: 17th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE 2008, Rome, Italy, 23\u201325 June 2008, Proceedings, pp. 257\u2013262. IEEE Computer Society (2008). https:\/\/doi.org\/10.1109\/WETICE.2008.34","DOI":"10.1109\/WETICE.2008.34"},{"key":"4_CR61","doi-asserted-by":"publisher","unstructured":"Zhou, X., Belloum, A., Lees, M.H., van Engers, T.M., de\u00a0Laat, C.: The dynamics of corruption under an optional external supervision service. Appl. Math. Comput. 457, 128172 (2023). https:\/\/doi.org\/10.1016\/J.AMC.2023.128172","DOI":"10.1016\/J.AMC.2023.128172"}],"container-title":["Lecture Notes in Computer Science","Formal Techniques for Distributed Objects, Components, and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-62645-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T05:02:40Z","timestamp":1718168560000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-62645-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031626449","9783031626456"],"references-count":61,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-62645-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"FORTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Techniques for Distributed Objects, Components, and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Groningen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"44","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"forte2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}